github.com/swisspost/terratest@v0.0.0-20230214120104-7ec6de2e1ae0/test/azure/terraform_azure_keyvault_example_test.go (about)

     1  //go:build azure
     2  // +build azure
     3  
     4  // NOTE: We use build tags to differentiate azure testing because we currently do not have azure access setup for
     5  // CircleCI.
     6  
     7  package test
     8  
     9  import (
    10  	"testing"
    11  
    12  	"github.com/gruntwork-io/terratest/modules/azure"
    13  	"github.com/gruntwork-io/terratest/modules/random"
    14  	"github.com/gruntwork-io/terratest/modules/terraform"
    15  	"github.com/stretchr/testify/assert"
    16  )
    17  
    18  func TestTerraformAzureKeyVaultExample(t *testing.T) {
    19  	t.Parallel()
    20  
    21  	uniquePostfix := random.UniqueId()
    22  
    23  	// website::tag::1:: Configure Terraform setting up a path to Terraform code.
    24  	terraformOptions := &terraform.Options{
    25  		// The path to where our Terraform code is located
    26  		TerraformDir: "../../examples/azure/terraform-azure-keyvault-example",
    27  		Vars: map[string]interface{}{
    28  			"postfix": uniquePostfix,
    29  		},
    30  	}
    31  
    32  	// website::tag::6:: At the end of the test, run `terraform destroy` to clean up any resources that were created
    33  	defer terraform.Destroy(t, terraformOptions)
    34  
    35  	// website::tag::2:: Run `terraform init` and `terraform apply`. Fail the test if there are any errors.
    36  	terraform.InitAndApply(t, terraformOptions)
    37  
    38  	// website::tag::3:: Run `terraform output` to get the values of output variables
    39  	resourceGroupName := terraform.Output(t, terraformOptions, "resource_group_name")
    40  	keyVaultName := terraform.Output(t, terraformOptions, "key_vault_name")
    41  	expectedSecretName := terraform.Output(t, terraformOptions, "secret_name")
    42  	expectedKeyName := terraform.Output(t, terraformOptions, "key_name")
    43  	expectedCertificateName := terraform.Output(t, terraformOptions, "certificate_name")
    44  
    45  	// website::tag::4:: Determine whether the keyvault exists
    46  	keyVault := azure.GetKeyVault(t, resourceGroupName, keyVaultName, "")
    47  	assert.Equal(t, keyVaultName, *keyVault.Name)
    48  
    49  	// website::tag::5:: Determine whether the secret, key, and certificate exists
    50  	secretExists := azure.KeyVaultSecretExists(t, keyVaultName, expectedSecretName)
    51  	assert.True(t, secretExists, "kv-secret does not exist")
    52  
    53  	keyExists := azure.KeyVaultKeyExists(t, keyVaultName, expectedKeyName)
    54  	assert.True(t, keyExists, "kv-key does not exist")
    55  
    56  	certificateExists := azure.KeyVaultCertificateExists(t, keyVaultName, expectedCertificateName)
    57  	assert.True(t, certificateExists, "kv-cert does not exist")
    58  }